-
1
-
-
0037086890
-
Wireless Sensor Networks: A Survey
-
Mar
-
I. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "Wireless Sensor Networks: A Survey," Computer Networks, vol. 38, no. 4, Mar. 2002.
-
(2002)
Computer Networks
, vol.38
, Issue.4
-
-
Akyildiz, I.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
2
-
-
0036983290
-
GHT: A Geographic Hash Table for Data-Centric Storage
-
Sept
-
S. Ratnasamy, B. Karp, L. Yin, F. Yu, D. Estrin, R. Govindan, and S. Shenker, "GHT: A Geographic Hash Table for Data-Centric Storage," Proc. First ACM Workshop Wireless Sensor Networks and Applications (WSNA '02), Sept. 2002.
-
(2002)
Proc. First ACM Workshop Wireless Sensor Networks and Applications (WSNA '02)
-
-
Ratnasamy, S.1
Karp, B.2
Yin, L.3
Yu, F.4
Estrin, D.5
Govindan, R.6
Shenker, S.7
-
3
-
-
21144446980
-
Resilient Data-Centric Storage in Wireless Ad-Hoc Sensor Networks
-
A. Ghose, J. Grobklags, and J. Chuang, "Resilient Data-Centric Storage in Wireless Ad-Hoc Sensor Networks," Proc. Fourth Int'l Conf. Mobile Data Management (MDM '03), pp. 45-62, 2003.
-
(2003)
Proc. Fourth Int'l Conf. Mobile Data Management (MDM '03)
, pp. 45-62
-
-
Ghose, A.1
Grobklags, J.2
Chuang, J.3
-
4
-
-
84943517831
-
Data Dissemination with Ring-Based Index for Wireless Sensor Networks
-
Nov
-
W. Zhang, G. Cao, and T. La Porta, "Data Dissemination with Ring-Based Index for Wireless Sensor Networks," Proc. 11th IEEE Int'l Conf. Network Protocols (ICNP '03), pp. 305-314, Nov. 2003.
-
(2003)
Proc. 11th IEEE Int'l Conf. Network Protocols (ICNP '03)
, pp. 305-314
-
-
Zhang, W.1
Cao, G.2
La Porta, T.3
-
5
-
-
0034547115
-
GPSR: Greedy Perimeter Stateless Routing for Wireless Networks
-
B. Karp and H. Kung, "GPSR: Greedy Perimeter Stateless Routing for Wireless Networks," Proc. ACM MobiCom, 2000.
-
(2000)
Proc. ACM MobiCom
-
-
Karp, B.1
Kung, H.2
-
6
-
-
0036949025
-
A Two-Tier Data Dissemination Model for Large-Scale Wireless Sensor Networks
-
Sept
-
F. Ye, H. Luo, J. Cheng, S. Lu, and L. Zhang, "A Two-Tier Data Dissemination Model for Large-Scale Wireless Sensor Networks," Proc. ACM MobiCom, pp. 148-159, Sept. 2002.
-
(2002)
Proc. ACM MobiCom
, pp. 148-159
-
-
Ye, F.1
Luo, H.2
Cheng, J.3
Lu, S.4
Zhang, L.5
-
7
-
-
10844226195
-
Data-Centric Storage in Sensornets
-
S. Ratnasamy, D. Estrin, R. Govindan, B. Karp, L. Yin, S. Shenker, and F. Yu, "Data-Centric Storage in Sensornets," Proc. ACM First Workshop Hot Topics in Networks, 2001.
-
(2001)
Proc. ACM First Workshop Hot Topics in Networks
-
-
Ratnasamy, S.1
Estrin, D.2
Govindan, R.3
Karp, B.4
Yin, L.5
Shenker, S.6
Yu, F.7
-
8
-
-
67649527679
-
-
The Smartdust Project, http://robotics.eecs.berkeley.edu/pister/ SmartDust/, 2008.
-
The Smartdust Project, http://robotics.eecs.berkeley.edu/pister/ SmartDust/, 2008.
-
-
-
-
9
-
-
0041165532
-
Euclidean Steiner Minimum Trees: An Improved Exact Algorithm
-
P. Winter and M. Zachariasen, "Euclidean Steiner Minimum Trees: An Improved Exact Algorithm," Networks, vol. 30, no. 3, pp. 149-166, 1997.
-
(1997)
Networks
, vol.30
, Issue.3
, pp. 149-166
-
-
Winter, P.1
Zachariasen, M.2
-
10
-
-
2342502819
-
Preserving Privacy in Environments with Location-Based Applications
-
G. Myles, A. Friday, and N. Davies, "Preserving Privacy in Environments with Location-Based Applications," IEEE Pervasive Computing, 2003.
-
(2003)
IEEE Pervasive Computing
-
-
Myles, G.1
Friday, A.2
Davies, N.3
-
13
-
-
85092924851
-
Privacy-Aware Location Sensor Networks
-
M. Gruteser, G. Schelle, A. Jain, R. Han, and D. Grunwald, "Privacy-Aware Location Sensor Networks," Proc. Ninth USENIX Workshop Hot Topics in Operating Systems (HotOS '03), 2003.
-
(2003)
Proc. Ninth USENIX Workshop Hot Topics in Operating Systems (HotOS '03)
-
-
Gruteser, M.1
Schelle, G.2
Jain, A.3
Han, R.4
Grunwald, D.5
-
15
-
-
0019532104
-
Untraceable Electronic Mail, Return Address, and Digital Pseudonyms
-
D. Chaum, "Untraceable Electronic Mail, Return Address, and Digital Pseudonyms," Comm. ACM, vol. 24, no. 2, pp. 84-88, 1981.
-
(1981)
Comm. ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
17
-
-
34548302064
-
pDCS: Security and Privacy Support for Data-Centric Sensor Networks
-
M. Shao, S. Zhu, W. Zhang, and G. Cao, "pDCS: Security and Privacy Support for Data-Centric Sensor Networks," Proc. IEEE INFOCOM, 2007.
-
(2007)
Proc. IEEE INFOCOM
-
-
Shao, M.1
Zhu, S.2
Zhang, W.3
Cao, G.4
-
18
-
-
0034771605
-
Spins: Security Protocols for Sensor Networks
-
A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. Tygar, "Spins: Security Protocols for Sensor Networks," Proc. ACM MobiCom, 2001.
-
(2001)
Proc. ACM MobiCom
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.5
-
21
-
-
3042783638
-
A Pairwise Key PreDistribution Scheme for Wireless Sensor Networks
-
W. Du, J. Deng, Y. Han, and P. Varshney, "A Pairwise Key PreDistribution Scheme for Wireless Sensor Networks," Proc. 10th ACM Conf. Computer and Comm. Security (CCS '03), pp. 42-51, 2003.
-
(2003)
Proc. 10th ACM Conf. Computer and Comm. Security (CCS '03)
, pp. 42-51
-
-
Du, W.1
Deng, J.2
Han, Y.3
Varshney, P.4
-
24
-
-
84943553152
-
Establishing Pair-Wise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Approach
-
S. Zhu, S. Xu, S. Setia, and S. Jajodia, "Establishing Pair-Wise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Approach," Proc. 11th IEEE Int'l Conf. Network Protocols (ICNP '03), 2003.
-
(2003)
Proc. 11th IEEE Int'l Conf. Network Protocols (ICNP '03)
-
-
Zhu, S.1
Xu, S.2
Setia, S.3
Jajodia, S.4
-
25
-
-
33144476837
-
Location-Based Compromise-Tolerant Security Mechanisms for Wireless Sensor Networks
-
Feb
-
Y. Zhang, W. Liu, W. Lou, and Y. Fang, "Location-Based Compromise-Tolerant Security Mechanisms for Wireless Sensor Networks," IEEE J. Selected Areas in Comm., Feb. 2006.
-
(2006)
IEEE J. Selected Areas in Comm
-
-
Zhang, Y.1
Liu, W.2
Lou, W.3
Fang, Y.4
-
26
-
-
25844473466
-
Group Rekeying for Filtering False Data in Sensor Networks: A Predistribution and Local Collaboration-Based Approach
-
Mar
-
W. Zhang and G. Cao, "Group Rekeying for Filtering False Data in Sensor Networks: A Predistribution and Local Collaboration-Based Approach," Proc. IEEE INFOCOM, Mar. 2005.
-
(2005)
Proc. IEEE INFOCOM
-
-
Zhang, W.1
Cao, G.2
-
27
-
-
37849028668
-
A Random Perturbation-Based Scheme for Pairwise Key Establishment in Sensor Networks
-
W. Zhang, M. Tran, S. Zhu, and G. Cao, "A Random Perturbation-Based Scheme for Pairwise Key Establishment in Sensor Networks," Proc. ACM MobiHoc, 2007.
-
(2007)
Proc. ACM MobiHoc
-
-
Zhang, W.1
Tran, M.2
Zhu, S.3
Cao, G.4
-
29
-
-
0034838199
-
Elk, a New Protocol for Efficient Large-Group Key Distribution
-
A. Perrig, D. Song, and D. Tygar, "Elk, a New Protocol for Efficient Large-Group Key Distribution," Proc. IEEE Symp. Security and Privacy, 2001.
-
(2001)
Proc. IEEE Symp. Security and Privacy
-
-
Perrig, A.1
Song, D.2
Tygar, D.3
-
30
-
-
84880852861
-
Revocation and Tracing Schemes for Stateless Receivers
-
D. Naor, M. Naor, and J. Lotspiech, "Revocation and Tracing Schemes for Stateless Receivers," Proc. Advances in Cryptology (CRYPTO 'OD, pp. 41-62, 2001.
-
(2001)
Proc. Advances in Cryptology (CRYPTO 'OD
, pp. 41-62
-
-
Naor, D.1
Naor, M.2
Lotspiech, J.3
-
32
-
-
85116486060
-
Location-Aided Routing in Mobile Ad Hoc Networks
-
Y. Ko and N. Vaidya, "Location-Aided Routing in Mobile Ad Hoc Networks," Proc. ACM MobiCom, pp. 66-75, 1998.
-
(1998)
Proc. ACM MobiCom
, pp. 66-75
-
-
Ko, Y.1
Vaidya, N.2
-
33
-
-
1542358974
-
Trajectory Based Forwarding and Its Applications
-
D. Niculescu and B. Nath, "Trajectory Based Forwarding and Its Applications," Proc. ACM MobiCom, 2003.
-
(2003)
Proc. ACM MobiCom
-
-
Niculescu, D.1
Nath, B.2
-
34
-
-
25844439422
-
Secure Positioning of Wireless Devices with Application to Sensor Networks
-
S. Capkun and J. Hubaux, "Secure Positioning of Wireless Devices with Application to Sensor Networks," Proc. IEEE INFOCOM, 2005.
-
(2005)
Proc. IEEE INFOCOM
-
-
Capkun, S.1
Hubaux, J.2
-
35
-
-
33750915976
-
GPS-Free Node Localization in Mobile Wireless Sensor Networks
-
June
-
H. Akcan, V. Kriakov, H. Bronnimann, and A. Delis, "GPS-Free Node Localization in Mobile Wireless Sensor Networks," Proc. Fifth Int'l ACM Workshop Data Eng. for Wireless and Mobile Access (MobiDE '06), June 2006.
-
(2006)
Proc. Fifth Int'l ACM Workshop Data Eng. for Wireless and Mobile Access (MobiDE '06)
-
-
Akcan, H.1
Kriakov, V.2
Bronnimann, H.3
Delis, A.4
-
38
-
-
33144489185
-
Secure and Resilient Clock Synchronization in Wireless Sensor Networks
-
K. Sun, P. Ning, and C. Wang, "Secure and Resilient Clock Synchronization in Wireless Sensor Networks," IEEE J. Selected Areas in Comm., vol. 24, no. 2, pp. 395-408, 2006.
-
(2006)
IEEE J. Selected Areas in Comm
, vol.24
, Issue.2
, pp. 395-408
-
-
Sun, K.1
Ning, P.2
Wang, C.3
-
39
-
-
33749987832
-
Attack-Resilient Time Synchronization for Wireless Sensor Networks
-
Jan
-
H. Song, S. Zhu, and G. Cao, "Attack-Resilient Time Synchronization for Wireless Sensor Networks," Ad Hoc Networks, vol. 5, no. 1, pp. 112-125, Jan. 2007.
-
(2007)
Ad Hoc Networks
, vol.5
, Issue.1
, pp. 112-125
-
-
Song, H.1
Zhu, S.2
Cao, G.3
-
42
-
-
11244260535
-
Channel Surfing and Spatial Retreats: Defenses against Wireless Denial of Service
-
W. Xu, T. Wood, W. Trappe, and Y. Zhang, "Channel Surfing and Spatial Retreats: Defenses against Wireless Denial of Service," Proc. ACM Workshop Wireless Security (WiSe '04), 2004.
-
(2004)
Proc. ACM Workshop Wireless Security (WiSe '04)
-
-
Xu, W.1
Wood, T.2
Trappe, W.3
Zhang, Y.4
-
43
-
-
67649527677
-
-
Crossbow Technology Inc
-
Crossbow Technology Inc., http://www.xbow.com, 2004.
-
(2004)
-
-
-
44
-
-
51349086896
-
Towards Statistically Strong Source Anonymity for Sensor Networks
-
M. Shao, Y. Yang, S. Zhu, and G. Cao, "Towards Statistically Strong Source Anonymity for Sensor Networks," Proc. IEEE INFOCOM, 2008.
-
(2008)
Proc. IEEE INFOCOM
-
-
Shao, M.1
Yang, Y.2
Zhu, S.3
Cao, G.4
-
45
-
-
56749163645
-
Towards Event Source Unobservability with Minimum Network Traffic in Sensor Networks
-
Y. Yang, M. Shao, S. Zhu, B. Urgaonkar, and G. Cao, "Towards Event Source Unobservability with Minimum Network Traffic in Sensor Networks," Proc. ACM Conf. Wireless Network Security (WiSec '08), 2008.
-
(2008)
Proc. ACM Conf. Wireless Network Security (WiSec '08)
-
-
Yang, Y.1
Shao, M.2
Zhu, S.3
Urgaonkar, B.4
Cao, G.5
-
48
-
-
33847255502
-
A Practical Study of Transitory Master Key Establishment for Wireless Sensor Networks
-
Sept
-
J. Deng, R. Han, and S. Mishra, "A Practical Study of Transitory Master Key Establishment for Wireless Sensor Networks," Proc. First IEEE/CreateNet Conf. Security and Privacy in Comm. Networks (SecureComm '05), pp. 289-299, Sept. 2005.
-
(2005)
Proc. First IEEE/CreateNet Conf. Security and Privacy in Comm. Networks (SecureComm '05)
, pp. 289-299
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
49
-
-
33847120377
-
Leap+: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks
-
S. Zhu, S. Setia, and S. Jajodia, "Leap+: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks," ACM Trans. Sensor Networks, vol. 2, 2007.
-
(2007)
ACM Trans. Sensor Networks
, vol.2
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
-
50
-
-
3543100577
-
Statistical En-Route Detection and Filtering of Injected False Data in Sensor Networks
-
F. Ye, H. Luo, S. Lu, and L. Zhang, "Statistical En-Route Detection and Filtering of Injected False Data in Sensor Networks," Proc. IEEE INFOCOM, 2004.
-
(2004)
Proc. IEEE INFOCOM
-
-
Ye, F.1
Luo, H.2
Lu, S.3
Zhang, L.4
-
51
-
-
19944369062
-
Soft Tamper-Proofing via Program Integrity Verification in Wireless Sensor Networks
-
T. Park and K. Shin, "Soft Tamper-Proofing via Program Integrity Verification in Wireless Sensor Networks," IEEE Trans. Mobile Computing, vol. 4, no. 3, 2005.
-
(2005)
IEEE Trans. Mobile Computing
, vol.4
, Issue.3
-
-
Park, T.1
Shin, K.2
-
52
-
-
3042738543
-
Swatt: Software-Based Attestation for Embedded Devices
-
May
-
A. Seshadri, A. Perrig, L. Doom, and P. Khosla, "Swatt: Software-Based Attestation for Embedded Devices," Proc. IEEE Symp. Security and Privacy, May 2004.
-
(2004)
Proc. IEEE Symp. Security and Privacy
-
-
Seshadri, A.1
Perrig, A.2
Doom, L.3
Khosla, P.4
-
53
-
-
47249110641
-
Distributed Software-Based Attestation for Node Compromise Detection in Sensor Networks
-
Y. Yang, X. Wang, S. Zhu, and G. Cao, "Distributed Software-Based Attestation for Node Compromise Detection in Sensor Networks," Proc. 26th IEEE Int'l Symp. Reliable Distributed Systems (SRDS '07), 2007.
-
(2007)
Proc. 26th IEEE Int'l Symp. Reliable Distributed Systems (SRDS '07)
-
-
Yang, Y.1
Wang, X.2
Zhu, S.3
Cao, G.4
-
54
-
-
0036948878
-
Minimum-Energy Broadcast in AU Wireless Networks: NP-Completeness and Distribution
-
M. Cagalj, J. Hubaux, and C. Enz, "Minimum-Energy Broadcast in AU Wireless Networks: NP-Completeness and Distribution," Proc. ACM MobiCom, 2002.
-
(2002)
Proc. ACM MobiCom
-
-
Cagalj, M.1
Hubaux, J.2
Enz, C.3
-
55
-
-
0014814325
-
Space/Time Trade-Offs in Hash Coding with Allowable Errors
-
B. Bloom, "Space/Time Trade-Offs in Hash Coding with Allowable Errors," Comm. ACM, 1970.
-
(1970)
Comm. ACM
-
-
Bloom, B.1
-
56
-
-
67649540012
-
-
The Tinydb Project
-
The Tinydb Project, http://telegraph.cs.berkeley.edu/tinydb/, 2008.
-
(2008)
-
-
-
57
-
-
0242303658
-
On the Complexity of Graph Tree Partition Problems
-
R. Cordone and F. Maffioli, "On the Complexity of Graph Tree Partition Problems," Discrete Applied Math., vol. 134, nos. 1-3, pp. 51-65, 2004.
-
(2004)
Discrete Applied Math
, vol.134
, Issue.1-3
, pp. 51-65
-
-
Cordone, R.1
Maffioli, F.2
-
58
-
-
67649561827
-
-
July
-
Weidai's Crypto++, http://www.eskimo.com/weidai/benchmarks.html, July 2005.
-
(2005)
Weidai's Crypto
-
-
|